Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T16263E7B29354683690AF59C6F478BF0563E3DF4AC64346D6B5F8A32A0DD8CA1F807417 |
|
CONTENT
ssdeep
|
768:NdHXBG33VQZelzuOUuOgpmMF9LT3X+iEy:NdHXBG3KZQzuOUuOgpl9LbX+iEy |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
bc3c9c4363c3c3c3 |
|
VISUAL
aHash
|
1a93ff83c3ffffff |
|
VISUAL
dHash
|
b23620260e000206 |
|
VISUAL
wHash
|
0083c383c3ffff81 |
|
VISUAL
colorHash
|
072000081c0 |
|
VISUAL
cropResistant
|
b23620260e000206,51d16169454dc545 |
• Threat: Roblox account credential harvesting phishing
• Target: Roblox users
• Method: Fake Roblox website with a login form stealing user credentials
• Exfil: Data sent to an unknown location (likely a malicious server) via JavaScript form submission
• Indicators: Suspicious TLD (.ml), URL domain contains the brand name, JavaScript form submission, and obfuscated JavaScript
• Risk: CRITICAL - Real-time credential theft
Pages with identical visual appearance (based on perceptual hash)
Found 10 other scans for this domain